This event is part of the digital skills week.
You often see it in the media: ‘unintentionally violating the GDPR’, ‘knowledge in foreign hands’ or ‘cyber criminals demanding ransom’. While it’s not possible to completely eliminate these risks, measures can be taken to make them less likely.
Many organisations adopt zero-trust principles, assuming that a solid external wall alone won’t adequately protect our systems and information. Instead, measures must be taken at every ‘link’. While it’s mainly IT’s job to manage these ‘links’, such as the network or devices, it’s different for information. Users are mainly responsible for creating, managing, and sharing information, which flows through business processes where colleagues and chain partners work together independently of time and place.
Collaboration between organisation and technology is crucial to gradually achieve the right balance between productivity and safety. This can only truly succeed if users are involved in drawing up, adjusting, and enforcing the information security policy. This is still unexplored territory within many organisations. The Rapid Circle explorers are happy to take you on an expedition to see how others have tackled this.
Disclosing information leads to higher productivity and innovation, but also requires adequate protection against misuse. What is the right balance? Where do you start? What impact do measures have on users? During this roundtable, we’ll talk to customers at different stages of maturity and try to illuminate the path together. Will you join us?
Topics that will be discussed include:
- How can it be determined what sensitive information (or crown jewels) is?
- What risks and opportunities do organisations that have already started see?
- Which roles should be involved in decisions regarding information security?
- Which technology helps with the correct classification and protection of information?
- How can it be demonstrated that the organisation meets privacy and protection requirements?
- What are the conditions for an information security project to succeed?
- What does the phasing and progress of such a project look like?
- What is needed to ensure the management and continuous improvement of information protection?